Matching Items (4)
Filtering by

Clear all filters

Description
The interaction between England and Scotland is complicated and continually changing. Scottish writer Sir Walter Scott examines this long-standing relationship through his various writings. Scott conveys a presence that is both acutely aware of the damages enacted upon Scotland by various English political efforts, and sensitive to the delicate relationshi

The interaction between England and Scotland is complicated and continually changing. Scottish writer Sir Walter Scott examines this long-standing relationship through his various writings. Scott conveys a presence that is both acutely aware of the damages enacted upon Scotland by various English political efforts, and sensitive to the delicate relationship that the two regions had begun to form during his lifetime. Through a critical analysis of Scott's novel, Rob Roy, one can see the various strategies Scott used to balance the need to address prior controversies within the relationship, and the petition to move beyond the prior conflict and develop a mutual understanding of each culture. Through this, Scott is able to regenerate a sense of Scottish nationalism for his people, and encourage improved relations within the British Isles.
ContributorsChotena, Chelsea (Author) / Facinelli, Diane (Thesis director) / Foy, Joseph (Committee member) / White, Julianne (Committee member) / Barrett, The Honors College (Contributor)
Created2013-05
157577-Thumbnail Image.png
Description
Emerging from years of research and development, the Internet-of-Things (IoT) has finally paved its way into our daily lives. From smart home to Industry 4.0, IoT has been fundamentally transforming numerous domains with its unique superpower of interconnecting world-wide devices. However, the capability of IoT is largely constrained by the

Emerging from years of research and development, the Internet-of-Things (IoT) has finally paved its way into our daily lives. From smart home to Industry 4.0, IoT has been fundamentally transforming numerous domains with its unique superpower of interconnecting world-wide devices. However, the capability of IoT is largely constrained by the limited resources it can employ in various application scenarios, including computing power, network resource, dedicated hardware, etc. The situation is further exacerbated by the stringent quality-of-service (QoS) requirements of many IoT applications, such as delay, bandwidth, security, reliability, and more. This mismatch in resources and demands has greatly hindered the deployment and utilization of IoT services in many resource-intense and QoS-sensitive scenarios like autonomous driving and virtual reality.

I believe that the resource issue in IoT will persist in the near future due to technological, economic and environmental factors. In this dissertation, I seek to address this issue by means of smart resource allocation. I propose mathematical models to formally describe various resource constraints and application scenarios in IoT. Based on these, I design smart resource allocation algorithms and protocols to maximize the system performance in face of resource restrictions. Different aspects are tackled, including networking, security, and economics of the entire IoT ecosystem. For different problems, different algorithmic solutions are devised, including optimal algorithms, provable approximation algorithms, and distributed protocols. The solutions are validated with rigorous theoretical analysis and/or extensive simulation experiments.
ContributorsYu, Ruozhou, Ph.D (Author) / Xue, Guoliang (Thesis advisor) / Huang, Dijiang (Committee member) / Sen, Arunabha (Committee member) / Zhang, Yanchao (Committee member) / Arizona State University (Publisher)
Created2019
158005-Thumbnail Image.png
Description
The traditional access control system suffers from the problem of separation of data ownership and management. It poses data security issues in application scenarios such as cloud computing and blockchain where the data owners either do not trust the data storage provider or even do not know who would have

The traditional access control system suffers from the problem of separation of data ownership and management. It poses data security issues in application scenarios such as cloud computing and blockchain where the data owners either do not trust the data storage provider or even do not know who would have access to their data once they are appended to the chain. In these scenarios, the data owner actually loses control of the data once they are uploaded to the outside storage. Encryption-before-uploading is the way to solve this issue, however traditional encryption schemes such as AES, RSA, ECC, bring about great overheads in key management on the data owner end and could not provide fine-grained access control as well.

Attribute-Based Encryption (ABE) is a cryptographic way to implement attribute-based access control, which is a fine-grained access control model, thus solving all aforementioned issues. With ABE, the data owner would encrypt the data by a self-defined access control policy before uploading the data. The access control policy is an AND-OR boolean formula over attributes. Only users with attributes that satisfy the access control policy could decrypt the ciphertext. However the existing ABE schemes do not provide some important features in practical applications, e.g., user revocation and attribute expiration. Furthermore, most existing work focus on how to use ABE to protect cloud stored data, while not the blockchain applications.

The main objective of this thesis is to provide solutions to add two important features of the ABE schemes, i.e., user revocation and attribute expiration, and also provide a practical trust framework for using ABE to protect blockchain data. To add the feature of user revocation, I propose to add user's hierarchical identity into the private attribute key. In this way, only users whose identity is not revoked and attributes satisfy the access control policy could decrypt the ciphertext. To add the feature of attribute expiration, I propose to add the attribute valid time period into the private attribute key. The data would be encrypted by access control policy where all attributes have a temporal value. In this way, only users whose attributes both satisfy the access policy and at the same time these attributes do not expire,

are allowed to decrypt the ciphertext. To use ABE in the blockchain applications, I propose an ABE-enabled trust framework in a very popular blockchain platform, Hyperledger Fabric. Based on the design, I implement a light-weight attribute certificate authority for attribute distribution and validation; I implement the proposed ABE schemes and provide a toolkit which supports system setup, key generation,

data encryption and data decryption. All these modules were integrated into a demo system for protecting sensitive les in a blockchain application.
ContributorsDong, Qiuxiang (Author) / Huang, Dijiang (Thesis advisor) / Sen, Arunabha (Committee member) / Doupe, Adam (Committee member) / Arizona State University (Publisher)
Created2020
131060-Thumbnail Image.png
Description
All modern multiplayer games are administered by having players connect to a remote server which is used to provide the ground truth for game state and player actions. This use of a central server provides a simple and intuitive way to administer game servers but also provides a single point

All modern multiplayer games are administered by having players connect to a remote server which is used to provide the ground truth for game state and player actions. This use of a central server provides a simple and intuitive way to administer game servers but also provides a single point of failure, as each server must be able to process all actions coming in and make a decision on whether the action is allowed or not, and how to update the game state accordingly. In cases where the server is under significant load, either from a very popular game release or from a deliberate attack, the game slows down or completely crashes. When there is a server action backlog, this can allow malicious actors to perform previously impossible actions. By instead using a decentralized platform, we can build a robust system that allows playing games through a P2P manner, filling in the need for central servers with consensus algorithms that provide the security on the part of a central authority. This project aims to show that a decentralized solution can be used to create a transparent, fully playable game of Monopoly with complex features that would be more scalable, reliable, and cost-effective compared to a centralized solution; meaning that games could be produced that costs pennies to publish and modify, taking seconds to propagate changes globally, and most importantly, cost nothing for upkeep. The codebase is available here: https://github.com/SirNeural/monopoly
ContributorsXu, Yun Hui (Author) / Boscovic, Dragan (Thesis director) / Foy, Joseph (Committee member) / Computer Science and Engineering Program (Contributor) / School of Mathematical and Statistical Sciences (Contributor) / Barrett, The Honors College (Contributor)
Created2020-12